The 40-20-40 rule suggests that the least of amount of development effort be spent on

A. estimation and planning 
B. analysis and design
C. testing
D. coding


Answer: D

Computer Science & Information Technology

You might also like to view...

One of the most commonly used_______-encryption algorithms is the Data Encryption Standard (DES).

a) symmetric. b) asymmetric. c) block. d) None of the above.

Computer Science & Information Technology

Which of the following risks relates to negative public opinion?

A) Operational risk B) Strategic risk C) Financial risk D) Reputational risk

Computer Science & Information Technology

The ________ function looks up values in a table array arranged as vertical columns

Fill in the blank(s) with correct word

Computer Science & Information Technology

Found in all folder windows, the ____ lets you know which folder you are viewing.?

A. ?address bar B. ?menu bar C. ?status bar D. ?navigation bar

Computer Science & Information Technology